Slide 33
Slide 33 text
@hayorov
KEEP CALM
https://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/
... allows a malicious container to (with minimal user interaction) overwrite
the host runc binary and thus gain root-level code execution on the host.
The level of user interaction is being able to run any command ... as root ...
affected: Debian, Docker, Debian, Red Hat, Ubuntu, AWS, GCP, Azure …
2019-02-11 CVE-2019-5736 Breaking out of Docker via runC Score 9.3
...for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on
container restart, or if the image was previously pulled to the node.
If the pod specified mustRunAsNonRoot: true, the kubelet will refuse
to start the container as root. If the pod did not specify
mustRunAsNonRoot: true, the kubelet will run the container as uid 0.
2019-08-28 CVE-2019-11245 Containers attempt to run as uid 0 Score 7.8